Kaspersky ID:
KLA12220
Дата обнаружения:
13/07/2021
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
  2. A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
  3. A spoofing vulnerability in Microsoft Office Online Server can be exploited remotely to spoof user interface.
  4. A security feature bypass vulnerability in Microsoft Office can be exploited remotely to bypass security restrictions.
  5. A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
  6. An information disclosure vulnerability in Microsoft SharePoint Server can be exploited remotely to obtain sensitive information.
  7. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.

Первичный источник обнаружения

Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2021-34452
    high
  • CVE-2021-34520
    high
  • CVE-2021-34451
    warning
  • CVE-2021-34467
    high
  • CVE-2021-34469
    high
  • CVE-2021-34517
    warning
  • CVE-2021-34468
    high
  • CVE-2021-34519
    warning
  • CVE-2021-34518
    high
  • CVE-2021-34501
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.